Informatica Advances Data Security Intelligence with Detection and Protection of Security Threats

Latest Informatica Secure@Source Release Solves Complex Enterprise Data Security Challenges for Cloud, Data Lakes and Compliance


Redwood City, Calif., March 01, 2017 (GLOBE NEWSWIRE) -- Next generation data security challenges require next generation solutions. Informatica®, the world’s No. 1 provider of data management solutions, today ushered in modern data security intelligence with the addition of powerful and innovative data-focused user behavioral analytics to detect higher sensitive data risk and protect by orchestration of remediation capabilities to its award-winning data security offering, Informatica Secure@Source®

Seemingly every day, a new onslaught of fresh challenges to data security arise. This is, in part, because of the increasing proliferation of sensitive data in cloud and mobile environments, data lakes and other big data repositories. According to Gartner, “data security governance and the orchestration of data security policies across disparate data silos and platforms will be critical challenges for organizations during the next decade.[1]” The latest version of Secure@Source, dubbed “Detect and Protect,” brings next generation data security intelligence to bear on these cascading challenges by providing:

  • Automated and integrated sensitive data discovery, proliferation analysis, detection of anomalous user activities, multi-factor data risk analytics, and automated orchestration of remediation in a single platform.
  • Broad coverage across cloud, Hadoop and legacy environments.
  • Unique capabilities supporting diverse and complex data classifications, proliferation and risk analytics, user access and activity correlation, user behavior analytics (UBA) and orchestration support for a full range of data protection technologies.

Secure@Source helps businesses achieve several successful outcomes, including:

  • Reduced risk of data breaches and misuse through more proactive and intelligent sensitive data risk monitoring, investment prioritization and protection,
  • Increased support for data privacy compliance mandates such as GDPR, HIPAA and FINRA, and
  • Low total cost of ownership due to a comprehensive single platform.

Intelligent Detection and Protection
Secure@Source provides the strongest set of detection and protection capabilities presently available to power the entire data security cycle. Secure@Source customers gain the ability to:

  • Know where sensitive data resides – Global visibility, classification, discovery and reporting of an enterprise’s sensitive data and where it is proliferating.
  • Recognize what is at risk – Continuous multi-factor risk scoring based on data sensitivity, protection status, risk cost and more, leveraging Informatica’s innovative interactive risk analytics technologies.
  • Understand who is using the data – Visibility into users with access to sensitive data, with usage monitoring and highly accurate anomalous behavior detection.
  • Orchestrate effective remediation actions – Risk-based remediation recommendations and orchestration of data security measures including dynamic or persistent data masking, encryption, blocking and other solutions from Informatica and third-party providers.

Secure@Source is part of Informatica’s family of data-centric security offerings for today’s data-centric world. Secure@Source recently was awarded a total of 11 medals, including a Grand Prize and five Golds in Info Security Product Guide’s prestigious 2017 Global Excellence Awards program. This included medals for Risk Management, Innovation in Enterprise Security, Best Security Software, Cloud Security, UBA, Compliance, Data Lake Security (Best New Product) and more.

According to Gartner, “security spending on detection and response to attacks on systems and services must be refocused to monitor and protect applications and data. Security and risk management leaders should use data security governance to prepare risk-based security strategies and infonomics to reset budgets.[2]

Supporting Quote

  • “Despite all the time, effort and billions, maybe trillions, of dollars spent, security is not working. Security breaches are still on the rise because most organizations are taking the wrong approach; they are focused on securing the end-points,” said Amit Walia, executive vice president and chief product officer, Informatica. “Informatica is taking a unique approach with Secure@Source. ‘Detect and Protect’ represents the next generation of data security intelligence because it is securing data at its source. Secure@Source is a uniquely unified, data-centric security solution that empowers organizations to quickly and accurately assess where they need to focus investments and resources to reduce the escalating risk of data breaches and misuse.”

Tweet this: News: @Informatica SecureAtSource detects & protects to deliver next-gen data security intelligence http://infa.media/pr170301a  

About Informatica
Informatica is 100 percent focused on data because the world runs on data. Organizations need business solutions around data for the cloud, big data, real-time and streaming. Informatica is the world’s No. 1 provider of data management solutions, in the cloud, on-premise or in a hybrid environment. More than 7,000 organizations around the world turn to Informatica for data solutions that power their businesses. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or visit www.informatica.com. Connect with Informatica at https://linkedin.com/company/informaticahttps://twitter.com/Informatica and https://facebook.com/InformaticaLLC.

###

Note: Informatica and Secure@Source are registered trademarks of Informatica in the United States and in jurisdictions throughout the world. All other company and product names may be trade names or trademarks of their respective owners.




[1] Gartner, “Application and Data Security Primer for 2017,” Brian Lowans, Ayal Tirosh and John Girard, 24 January 2017

[2] Gartner, “Predicts 2017: Application and Data Security.” Brian Lowans, Neil MacDonald, Marc-Antoine Meunier and Brian Reed, 22 November 2016



            

Contact Data